Thursday 11 August 2011

Hacking Facebook - The art of Keyloggers





Hi everyone!!
Today I'm going to tell you another technique of swooping  facebook passwords, called as Keylogging. You might have heard about this term, or maybe performed it, but sometimes people don't realize that this is sometimes the easiest and the most effective way of hacking facebook passwords.

I have tried my best to keep the post simple to understand making the text a bit long in the process, I request you to read it thoroughly since this attack is quite simple. If you are stuck somewhere or want some help, feel free to comment below.
 
Ok, Without further ado, lets get started!!



A Keylogger is a program or a device that is programmed to capture keystrokes pressed on a computer(hence the name keylogger!). Keylogger silently records the keystrokes pressed by the victim and yields the information to the attacker. When the unsuspecting user signs in to his/her facebook, their login details are recorded by the keylogger.

I posted an article on hacking facebook by a Phishing attack. Here are a few advantages of keylogging over phishing:

  • No need of websites.
  • No Programming Knowledge required.
  • Nearly undetectable since there is no change in the URL of facebook.
  • Very simple to accomplish.
If you haven't read my article on Facebook Phishing, I would recommend you to read it here.

Ok, back to keyloggers. Since you are now familiar with what keyloggers can do, here are the types of Keyloggers available at your disposal.

  1. Hardware Keyloggers 
Hardware Keyloggers are hardware devices that is connected to victim's CPU to monitor the keystrokes. These keyloggers grab the keystrokes are they are pressed on the keyboard and make their way to the CPU. These Keyloggers have inbuilt storage like pen drives and USB flash sticks. The captured keystrokes are stored in this memory. Modern Hardware Keyloggers come in ps2, usb and other interfaces and have a very small size.

The following diagram shows a hardware keylogger installed on a system.
                                    Normal System             System with Keylogger


Drawbacks of Hardware Keyloggers
  • Costly.
  • Requires physical access to victim's computer.
  • Difficult to hide from victim's eye.


      2. Software Keyloggers 

When hardware keyloggers fail, software keyloggers comes to our rescue. These keyloggers are programs that come with nice GUI interfaces and easy and guided installation mechanisms.

Here is a screenshot of a software keylogger interface:

Modern software keyloggers support these cool features:
  • Remote Deployment. You do not require physical access to victim's machine, just send them a small file which installs the keylogger into their systems.
  • Chat Logging. Ability of recording facebook chats.
  • Program Activity Monitor. The keylogger can record various programs opened or accessed by the victim. This ability makes keyloggers popular amongst employers who want to monitor their employee online and offline activity or parents who want to monitor their kids.
  • Screenshot Ability. Keyloggers can click pictures of victim's screen at customizable time intervals.
  • Cloaking. Keyloggers can completely hide themselves by removing the shortcuts to their program, removing instance from add/remove program in the control panel, masking task manager process entry at run time etc.This feature makes the keylogger very hard to detect.
  • Undetectables. The use of keyloggers is an attempt to steal private data and hence it is considered invasive and illegal. Antivirus programs detect the presence of suck keyloggers in the systems, but many keylogger developers claims their software to be undetectable from all the major antivirus programs.
There are bunch of other features that are native to their corresponding keylogger program.



Recommended Keyloggers

There are many keyloggers available but the ones I recommend are as follows:

  • Sniperspy : Undoubtedly the most powerful and effective keylogger with remote monitoring properties. SniperSpy is the latest in cutting-edge monitoring technology that allows you to actually monitor your remote PC from anywhere. SniperSpy is remotely deployable (no physical installation needed) and logs are accessible from anywhere. They also provide you with all the guidance you require plus you get your online control panel where your logs will be stored securely you can watch the victim's computer LIVE like television, download there files, stop or run programs on their computer and more. Sniperspy is my pick amongst the keyloggers. More information here

    Get it here:  Sniperspy for Windows                          Sniperspy for Mac

    what's better is that you can trial download it to see for yourself:
    Trial download for Windows                                  Trial download for Mac

  • Winspy: Same as sniperspy but with lesser features. I Like sniperspy more but winspy is really good too.
    Get it here.
 I have bunch of other Keyloggers which I am giving away for free. If you like one for yourself, send me a comment below with your email id on which I can send you the software.
I hope you have enjoyed the post. Stay tuned for more cool posts.

No comments:

Post a Comment